February 2016
Intermediate to advanced
296 pages
6h 9m
English
In the previous recipe, we prepared our environment to attack an SSL/TLS connection while, in this recipe, we will use SSLsplit to complement a MITM attack and extract information from an encrypted communication.
We need to have an ARP spoofing attack executing before we start this recipe and have successfully completed the previous recipe Setting up an SSL MITM attack.
mkdir /tmp/sslsplit mkdir /tmp/sslsplit/logdir
sslsplit -D -l connections.log -j /tmp/sslsplit -S logdir -k certauth.key -c ca.crt ssl 0.0.0.0 ...Read now
Unlock full access